© 2023 Hashnode
#ctf
Repository: https://github.com/blessing-mufaro/vapt-engagement-guide 📝The important bit This repository will essentially serve as a VAPT (Vulnerability Assessment and Penetration Test) guide or handb…
Background This was my second participation in a CTF event organized by Sekurak team. As before, being part of the MSHP event, it gathered around real pros in the field - but also this time due to Int…
My GitHub repo with all Damn Vulnerable DeFi CTF solutions. First, let's discuss the key points to understand how to break this challenge: This challenge introduced Uniswap v3 prices calculation and …
(Whispering…)I have a confession to make. I have a problem:I can’t stop learning -I just love it so much. I wake up with an ebook,I fall asleep with a phone,I take a shit while reading the news and blogs. My girlfriend is jealous of me and …
About the machine: This Rick and Morty-themed challenge requires you to exploit a web server and find three ingredients to help Rick make his potion and transform himself back into a human from a pick…
General Remarks CTF Page Link: https://compete.metactf.com/ DawgCTF was accommodative of all levels of expertise (Beginner Friendly) - and the challenges gave a fair chance for all CTF players to lear…
Web application security is a critical aspect of modern-day technology, and it's essential for developers, security professionals, and anyone involved in building or maintaining web applications to un…
archived chall: archived by sandr0 difficulty: easy description: I’m using this super secure big company open source software, what could go wrong? Two credentials are provided, admin and regular user. The challenge consists of a serve…
TLDR: Trong quá trình pentest và làm report, nếu gặp các CWE liên quan đến CORS (cross-origin resource sharing) như CWE-942 thì y như rằng mình sẽ "vứt nó vào sọt rác" hoặc cùng lắm là PoC "cho có lệ"…
GCTF or Gryphon CTF is a Capture-The-Flag event hosted by Cybersecurity students from Singapore Poly. This write-up provides a solution to solve one of the binary exploitation, a.k.a PWN challenges, t…